Female Rep1


 "99% Positive Customer Satisfaction Rate"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

Using Cortana Gets Better with Customization
Tip of the Week: How to Type Accent Marks and Symb...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Network Security Business Computing Backup Malware Hosted Solutions Mobile Devices Google Data VoIP Microsoft Business roundup Email nonprofit Software bgc Disaster Recovery Innovation Internet Managed IT Services Business Continuity Alert Hardware Outsourced IT communications IT Services Smartphones User Tips Managed IT Services Browser Tech Term Data Backup Windows 10 Ransomware Computer Server Saving Money Data Recovery Efficiency Cybercrime Cloud Computing Android Smartphone Network BDR Internet of Things Computers IT Support Business Management Small Business Workplace Tips Windows IT Support Communication Quick Tips Passwords Save Money Office Productivity Productivity Miscellaneous Telephone Systems BYOD Cybersecurity Artificial Intelligence Managed IT Chrome Money Social Engineering Recovery Mobile Device Management Applications Hacking Upgrade Law Enforcement Facebook Firewall Mobility Phishing Windows 10 Work/Life Balance Gadgets Social Media Virtualization Vulnerability Collaboration Managed Service Provider Information How To Flexibility Router Compliance Budget Office Tips VPN Avoiding Downtime Proactive IT App Private Cloud Bring Your Own Device Health Wi-Fi Bandwidth Password Two-factor Authentication Holiday Microsoft Office Office 365 Remote Monitoring Data Protection Automation Google Drive HaaS Information Technology Value Connectivity Safety History Black Market Data Security Operating System Mobile Device Servers Apps Identity Theft Keyboard Remote Computing Data Breach Business Intelligence Redundancy Word Sports Mobile Computing Spam Scam Wireless Technology Data Storage Website Legal Marketing Save Time Electronic Medical Records HIPAA YouTube CES Risk Management IT Management Voice over Internet Protocol Worker Software as a Service Physical Security Automobile Employer-Employee Relationship Encryption Managed Service Comparison Content Management Unified Threat Management Spam Blocking IT Plan Update Data Management Hiring/Firing USB The Internet of Things SaaS End of Support Blockchain Virtual Assistant Cleaning Battery Content Filtering Entertainment Training Workers Data storage WiFi Credit Cards Business Owner Telephone System Computer Care Emergency Patch Management OneNote Infrastructure Paperless Office Windows 7 Fraud Big Data PDF Document Management Government Samsung Computing Infrastructure Unsupported Software Solid State Drive Charger Settings Television CrashOverride Password Manager Machine Learning Bluetooth Going Green Netflix Regulations Amazon Files Shadow IT Hosted Computing Books Remote Worker Professional Services Cache Leadership Frequently Asked Questions Telecommuting Instant Messaging Digital Signature Audit Hacker Users Warranty Transportation Current Events Search Engine Software Tips Humor Cryptocurrency Skype Cables Public Computer Best Practice Business Mangement Content HVAC Amazon Web Services Inventory Hosted Solution Wiring Meetings Wireless Internet Excel Remote Work Apple Search Loyalty Computer Fan Unified Communications Internet Exlporer Virtual Reality Devices Printer Benefits Knowledge Bing Politics Safe Mode Start Menu Multi-Factor Security Gmail Audiobook Networking Rootkit Online Shopping Access Control Data loss Cortana Wire Tip of the week iPhone How to Accountants MSP FENG Tools Theft Worker Commute Thought Leadership Mouse Smart Technology Network Congestion Help Desk HBO Specifications Windows 10s Authentication Chromecast Trending Video Games Recycling Enterprise Content Management Laptop Flash Evernote User Error Screen Mirroring Wireless Google Apps Smart Office Employer Employee Relationship webinar Windows Server 2008 Downtime Troubleshooting File Sharing Reputation Advertising Twitter Administrator Two Factor Authentication Outlook Millennials Scalability Human Resources Experience Public Cloud Colocation Education Nanotechnology Camera IBM Data Warehousing Lifestyle Hard Drives eWaste Password Management Vendor Management Touchpad Sync Wireless Charging Monitor NarrowBand Assessment Cast Google Docs Computer Accessories Conferencing Robot Practices Augmented Reality Mobile Customers Techology Addiction IT Consultant Workforce Staff Regulation Smart Tech Printers Supercomputer Microchip Relocation Criminal NIST Telephony Fiber-Optic Thank You GDPR Congratulations E-Commerce nonprofits